The Private Security State?
|
|
- Preston Stokes
- 8 years ago
- Views:
Transcription
1 ISBN: The Private Security State? The last decade has witnessed the emergence of a surveillance- industrial complex as securitised data about customers begins to flow between the private sector and government. Governments and their security agencies are mandating businesses to transfer data about their customers in a number of key industrial sectors. Organisations in financial services, travel and latterly, communications, now provide the very data which enable decisions about risk and security deployment to be made. This book revolves around case studies of two surveillance regimes: The Anti-Money Laundering/Counter Terror Finance regulations in retail financial services; and the eborders regulations in the retail travel industry. The Private Security State? examines how these new government demands for information intertwine with the activities of private sector organisations, as their systems, processes, custo mers and employees are integrated into national security frameworks. Through detailed empirical analysis it questions how private sector organisations achieve compliance with demands for customer data. Whilst others have argued that diffused security arrangements de-politicises it, The Private Security State? shows that national se curity becomes re-politicised as it re-surfaces in the politics of production within the business enterprise. The Private Security State? Surveillance, Consumer Data and the War on Terror Kirstie Ball, Ana Canhoto, Elizabeth Daniel, Sally Dibb, Maureen Meadows and Keith Spiller Omslag med zoomburst.indd 1 25/02/
2 The Private Security State?
3
4 Kirstie Ball, Ana Canhoto, Elizabeth Daniel, Sally Dibb, Maureen Meadows and Keith Spiller The Private Security State? Surveillance, Consumer Data and the War on Terror
5 Kirstie Ball, Ana Canhoto, Elizabeth Daniel, Sally Dibb, Maureen Meadows and Keith Spiller The Private Security State? Surveillance, Consumer Data and the War on Terror 1. edition 2015 CBS Press 2015 Cover: SL grafik (slgrafik.dk) Typeset: SL grafik Print: Eurographic Danmark A/S E-bog ISBN: Tryk bog ISBN: CBS Press Rosenørns Allé Frederiksberg C slforlagene@samfundslitteratur.dk cbspress.dk All rights reserved. No part of this publication may be reproduced or used in any form or by any means graphic, electronic or mechanical including photocopying, recording, taping or information storage or retrieval systems without permission in writing from CBS Press.
6 Contents Acknowledgements 7 List of abbreviations 9 List of tables, figures and images 11 CHAPTER ONE Consumer data and the war on terror 13 The new political economy of security and surveillance CHAPTER TWO Market logics and regulation 29 Theorising private sector involvement in national security surveillance CHAPTER THREE Shaping the regimes 55 Stakeholders and their interests CHAPTER FOUR Secure information flows? 73 Tensions, disruptions and realignments in information infrastructures CHAPTER FIVE The strategic response 93 Recognising, rationalising and refashioning in the retail travel customer relationship CHAPTER SIX Embedded adaptations 109 Renegotiating and reworking in the financial services customer relationship
7 CHAPTER SEVEN Cross-selling for security 137 Remediation work at the retail travel front-line CHAPTER EIGHT Compliance conquers all? 153 Remediation work at the financial services front-line CHAPTER NINE The private security state 169 Responsibilisation, surveillance and security CHAPTER TEN The out-takes 189 Reflections on interdisciplinary working References 207 Appendices 229
8 Acknowledgements Acknowledgements Acknowledgements There are a number of individuals and organisations without whom this work would not have been possible. First we would like to thank the Leverhulme Trust for funding the work. Thank you for putting your faith in a team of business academics to shed light on the important questions of surveillance, security and the private sector. Second we would like to thank all of the anonymous participants in the fieldwork who so freely gave of their time to share their views with us. We would also like to thank the many industry associations who helped to facilitate access to different participants. In particular we would like to thank Richard Taylor at Travel Weekly, Doreen McKenzie of the ABTA Airlines Group, Timon Molloy at The Money Laundering Bulletin and the Institute of Money Laundering Prevention Officers who allowed us to attend their events. We would like to express our gratitude to the many academic friends and colleagues who have engaged with this work throughout the course of its life and have generously given us encouragement as well as their views on its development. In particular we would like to thank David Lyon, The New Transparency Project and Joan Sharpe, without which this work would not have been conceived. We would also like to thank Steve Graham who suggested the title for the book. We would like to thank many of our colleagues who, directly or indirectly, influenced the direction of the work: Anthony Amicelle, Louise Amoore, Caroline Clarke, Sara Degli Esposti, Marieke DeGoede, MariaLaura DiDomenico Gilles Favarel, Kevin Haggerty, Gerry Hanlon, Ben Hardy, Richard Holti, Jef Huysmans, Gavin Jack, David Knights, Reinhard Kreissl, David Murakami Wood, Mike Mc- Cahill, Clive Norris, Andras Pap, Jason Pridmore, Michael Nagenborg, Charles Raab, Caroline Ramsey, Bence Ságvarí, John Storey, Pinelopi Troulinnou, David C Wilson, William Webster, Dean Wilson and Nils Zurawski. We would also like to thank the participants in the 4th and 5th Biannual Surveillance and Society Conferences, Meiji University (Dis)embodiment unconference attendees in December 2013, various Living in Surveillance 7
9 Acknowledgements Societies EU-COST network events, the members of the IRISS and SurPRISE FP7 consortia and the CRISP and Surveillance Studies Centre Doctoral Training workshops. Finally we would like to thank Stewart Clegg and his colleagues at the Copenhagen Business School Press for encouraging us to write this book. 8
10 List of abbreviations List of abbreviations List of abbreviations ABTA: Association of British Travel Agents AML/CTF: Anti-Money Laundering/Counter Terror Finance AML: Anti-Money Laundering APIS: Advanced Passenger Information Systems ARA: Asset Recovery Agency (now part of SOCA) BA: British Airways BAR UK: Board of Airline Representatives for the United Kingdom BBA: British Bankers Association BV: Best Value CD: Compact Disc CDD: Customer Due Diligence CRM: Customer Relationship Management CSR: Corporate Social Responsibility DNA: Deoxyribose Nucleic Acid DVLA: Driver and Vehicle Licensing Agency EU: European Union FATF: Financial Action Task Force FISA: Foreign Intelligence Surveillance Act FSA: Financial Services Authority G-7: The Group of Seven Industrialised Nations GDS: Global Distribution System HMC: Home Affairs Committee II: Information Infrastructures IOS: Interorganisational Systems IT: Information Technology JMLSG: Joint Money Laundering Steering Group KYC: Know Your Customer LACTEW: Los Angeles County Terrorism Early Warning System LEA: Law Enforcement Agencies MLRO: Money Laundering Reporting Officer 9
11 List of abbreviations NBTC: National Border Targeting Centre NCA: National Crime Agency NPM: New Public Management NSA: National Security Agency NSL: National Security Letters OFCOM: Office of Communications OFWAT: Office of Water Services OTA: Office of Technology Assessment PNR: Passenger Name Record PPP: Public-Private Partnership SAR: Suspicious Activity Report SOCA: Serious Organised Crime Agency SWIFT: Society for Worldwide Interbank Financial Telecommunication UK: United Kingdom UKBA: United Kingdom Border Agency US: United States USA: United States of America 10
12 List of tables, figures and images List of tables, figures and images List of tables, figures and images Table 2.1. Management-based strategies (Coglianese and Nash, 2006: 14) 42 Table 3.1. Stakeholders in the eborders programme 61 Table 3.2. Stakeholders in AMC/CTF Table 4.1. Tensions associated with the II schemes Table 6.1. Structure of the survey instrument 115 Table 6.2. Descriptive statistics Table 6.3. Results of exploratory factor analysis Figure 3.1. Stakeholder structure for the eborders scheme 63 Figure 3.2. Stakeholder structure for the AML/CTF scheme 68 Figure 6.1. CRM pre-requisites and AML correlations 121 Figure 6.2. Strategic deployment of technology correlations 122 Figure 6.3. Customer knowledge capabilities correlations 242 Figure 6.4. Strategic customer focus correlations 243 Figure 6.5. Staff correlations 244 Figure 9.1. Travel industry surveillant mid-range 174 Figure 9.2. Financial services industry surveillant mid-range 175 Image Image Image Image Image Image Image Image Image Image
13 12 List of tables, figures and images
14 Consumer data and the war on terror CHAPTER ONE Consumer data and the war on terror The new political economy of security and surveillance Consumer data and the war on terror The last decade has witnessed a blurring of the boundaries between public and private sector organisations in relation to national security. This blurring of boundaries has expanded from the private provision of physical security services and infrastructure, to the provision of the very data which enable decisions about risk and deployment to be made. Pre-empting the moves of risky, targeted individuals using vast datasets gleaned from any 13
15 CHAPTER ONE number of sources is de rigueur in neoliberal government discourse and doctrine. In this new politics of pre-emption, mined data about the past transactions and activities of citizens become the template for risk analysis about future threats (DeGoede, 2008) and produces a contemporary world where new securitised data flows between the private sector and government are forged. A political focus on the prevention of terror, catching suspects before threats materialise and denying suspected individuals access to material and financial resources, mobility and communications has driven security policy developments in the last 15 years, both in the USA, Europe and Australia. Marieke DeGoede (2008:163) argues that this move towards pre-emption: has the consequence of creating an extra-legal field of intervention in which administrative bureaucracies, immigration officials, consultants and financial dataminers are authorized to make sovereign decisions concerning the normality and abnormality of particular persons, behaviours and transactions, and to detain, question, monitor and freeze those considered abnormal. Information about financial transactions, locations, and communications of citizens is among the most important and valuable for national security. 1 This book examines the implications of this policy move to pre-emption for the private sector organisations that are mandated to provide such information: those who are empowered to make these sovereign decisions. How do these new government demands for information intertwine with the activities of private sector organisations, as their systems, processes, customers and employees are integrated into national security frameworks? National security processes are becoming diffused, decentralised and embedded into the consumption and employment processes which enable everyday life to function (Huysmans, 2011). How do private organisations achieve compliance with demands for customer data, how are their business operations altered and how are customer relationships and employees affected? 1 US Director of National Intelligence, James R. Clapper, statement Thursday May 31st
16 Consumer data and the war on terror National security/public-private Now running into its second post 9/11 decade, the expansive reach of the so called War on Terror has reached a new level of maturity. Much of what we discuss in this book and indeed much of what has interested surveillance commentators, is the increasing prevalence and intensity of surveillance regimes on civilian populations or in the homeland. There are numerous examples of such intensification: at the more obvious sites such as airports (Adey, 2009; Wagenaar and Boersma, 2012), and mega-events (Bennett and Haggerty, 2011; Giulianotti and Klauser, 2010; Fussey and Coaffee, 2011), particularly the use of drones (Surveillance Studies Network, 2006; Finn and Wright, 2012; Graham, 2012) to shopping malls (Koskela, 2000) and train stations (Adey et al., 2013). Moreover, the financial costs of mega-events and the rewards received by a coterie of technological firms such as Siemens and Cisco, raise further questions: are these measures warranted, what is their legitimacy and what of the profiteering that results for security businesses (Samatas, 2005)? Collaboration between large defence contractors and the government has been a common feature of these developments. In the UK, government and the private sector have worked together on a number of fronts to intensify surveillance of the population. Recent, noteworthy collaborations have been between the DVLA and Experian in order to check on the background of drivers who make licence applications (Surveillance Studies Network, 2010) and between the various national governments and numerous large security companies in the securitising of mega-events such as the Olympics (Bennett and Haggerty, 2011). Public-private collaboration was also an outcome of the many statutes which have been made law since 9/11. Britain s special relationship with the USA in international security matters has had no small part to play here, extending, as it does, back to World War II. After George W. Bush called for Total Information Awareness in 2001, and amidst pressures from the international community, it is perhaps no co-incidence that the New Labour government enacted a series of laws e.g. the Anti-Terrorism, Crime and Security Act 2001, the Proceeds of Crime Act 2002, the Identity Card Act 2006 and the Immigration, Asylum and Nationality Act 2006, the Counter Terrorism Act 2008 which mandated the mass collection of communications, financial, identification and travel data from the general population respectively. 15
17 CHAPTER ONE Although some of these laws have fallen by the wayside, notably the National Identity Card scheme, which was abandoned in 2011, 2 a draft of new anti terror laws have been enacted or are proposed. It is the latest in a string of measures, which involve the private sector in national security. DRIPA (2014) reinstates the defunct Communications Data Bill and extends the UK government s communication surveillance powers internationally. The proposed legislation is premised on the private sector gathering, storing and transferring data to government when required. Internet service providers have to store communications data in the UK such as the time, duration, originator and recipient of a communication and the location of the device from which it was made for one year. Web browsing history and details of activity on social media, , voice calls over the Internet and gaming, in addition to phone calls would also be stored. Police could then access the details of the communication if investigating a crime, but would have to get a warrant from the Home Secretary to see the content of messages. One of the criticisms of the Bill raised by Liberty, a UK-based civil rights campaign organisation, were the potential dangers of outsourcing the monitoring of citizens to private companies. Furthermore the instantiation of a Data Analysis Warehouse in Wythenshawe, near Manchester, which is fed by the eborders regime legislated for in 2006, mirrors the function of data fusion centers in the USA which were introduced in The Los Angeles County Terrorism Early Warning Centre (LACTEW) was the first (German and Stanley, 2008) many more have been formed in the post 9/11 era (Monahan and Palmer 2009; Monahan 2011). The centres were ostensibly designed to gather information from an array of sources and join the dots. Data sharing information sourced from state and local police services, other emergency services, intelligence agencies, as well as private companies (Monahan and Palmer 2009: 618). The intention of the centres is to focus on not only terror, but also crime, hazards, trafficking, illegal immigration and all other threats. The centralizing of information in preventing and dealing with threats is the over-riding incentive of the centres. However, while the centres are mainly located in police buildings, analysts are often external contractors with, as Monahan (2011) argues, less ethical conviction or indeed training. Private and sensitive in- 2 accessed 11th December
18 Consumer data and the war on terror formation available to contractors can include credit reports and banking details. Further tools of extracting information include National Security Letters (NSL), which allows governmental agencies to secure personal information from internet service providers, telecommunications companies, credit agencies or banks (Richards, 2013). It is this national security-based collaboration with non-defence industry partners corporations whose products and services facilitate everyday life which is the significant point of departure. It would be naïve to assume that the US government provides the sole impetus for the collection of data from the private sector. The EU and Britain in particular have been willing partners in these developments (DeGoede, 2008). The USA, for example, were monitoring international bank transactions recorded in the Belgian-based SWIFT system illegally from Despite initial outrage when this was discovered, Europe eventually gave in to pressure from the USA and produced the SWIFT agreement in 2009, which gave the USA legal access to European financial transactions. The same is true of passenger name record sharing: a passenger name record, or PNR, is an airline s reservation system record which contains information about the passenger s booking. Mode of payment, seat and meal preferences would feature in the record. In 2011, Europe and the USA agreed to share PNR data, subject to a data protection safe harbour agreement. At the time of writing, however, the European Parliament has voted to suspend all security-related data sharing following the Edward Snowden revelations about the NSA and pending further data protection assurances. Within a legislative and political climate which is constantly emphasising private sector data gathering for government, a new political economy of security and surveillance has emerged. An entire industry has sprung up pedalling financial surveillance software and various countries around the world most notably South Africa 3 are seeking to emulate Europe s stance on PNR and Britain s approach to passport data capture. However, as this new political economy emerges, national security also becomes the latest domain for the titanic clash of public and private interests to play out. As Sennett (2006: 18) argues: 3 accessed April
19 CHAPTER ONE the multinational corporation used to be intertwined with the politics of the nation state the global corporation has investors and shareholders throughout the world and a structure of ownership too complex to serve national interests. Even though the global corporation is seen by some as vastly more powerful than the nation state, Sennett asserts that the current state of affairs is inherently destabilising for the corporation. Diffuse international ownership structures have resulted in what Bennett Harrison terms impatient capital empowered investors who want short term results. The demands of impatient capital mean that corporations have to adapt to such external demands for short term profitability and modify their internal structures accordingly. The ongoing impact of such modifications and hence instability on employees and local economies persistently foregrounds the question of government regulation and corporate social responsibility. Recent scandals over corporation tax payments by multinationals, irresponsible lending by banks and, of course, the financial crisis, alongside the perennial questions of globalisation and the environmental impact of capitalist production, highlight how at odds these two vast interest groups can be. Under what conditions then, and with what effects, could large corporations be enmeshed into national security arrangements? This research was conceived in 2008 and executed between At that point there had been no worldwide scandal about the mass surveillance of communications data by governments and no wider question of the private sector relationship in their sharing of consumer data. There was, however, widespread public awareness of The Surveillance Society. 4 In Britain surveillance had become an election issue as every political party promised to ensure that the records of innocent people were removed from the National DNA database. 5 There was also some academic concern about the levels of security to be implemented during the 2012 Olympic Games 6 as well as about the locus of surveillance, given that private sector actors were becoming more involved in the delivery of government services (particularly in the Criminal Justice, Health and Welfare arenas). By the 4 accessed 11th December accessed 11th December accessed 11th December
20 Consumer data and the war on terror time we came to write up the research, however, the ground had shifted to foreground the controversial involvement of the private sector in national security surveillance. The most significant development for our purposes was an open letter from the internet giants Google, Facebook, Twitter, Yahoo, Microsoft and LinkedIn imploring governments around the world to limit their surveillance powers in the name of free expression and privacy. At the time of writing, the letter can be found at Nearly all of these corporations, with the exception of LinkedIn, were implicated in the 2013 Snowden revelations. Using the Protect America Act 2007 and the FISA Amendments Act 2008, and suggesting a security-commerce win-win, the NSA offered selected internet corporations immunity from prosecution if they voluntarily co-operated with intelligence collection under its Prism programme. The NSA proceeded to collect customer data directly from the servers of Microsoft, Google and Yahoo (which provided 98% of the total dataset) as well as Skype, AOL, Facebook, YouTube, Apple and PalTalk. As they had been subject to court orders, the companies publicly denied any voluntary involvement with the programme, pointing out that they did not routinely share information with the NSA. Others gave the US government a less easy ride. Lavabit, Edward Snowden s e- mail service provider, chose to suspend its operations rather than provide the US government with the encryption keys for the information on their servers, which would have compromised the communications privacy of over 400,000 customers: a security-commerce lose-lose. Similarly, Twitter fought bitterly to prevent New York City gaining access to three months worth of tweets belonging to Occupy protestor Malcolm Harris. Eventually they capitulated under threat of a contempt of court ruling and heavy fines. The authors of the open letter would no doubt argue that communications data were gathered under legal duress (Bruce Schneier (2014) offers greater insight into the subtleties of such denials). 7 But a closer examination of the letter and its comments about trust on the Internet and the free flow of information in a 21st century economy belie the deep commercial concerns at the root of this protest. Threats to data security and privacy undermine brand value and commercial revenues as, in the words of Brad 7 acces sed March
21 CHAPTER ONE Smith of Microsoft, people won t use technology they don t trust. 8 The government s initiatives to collect communications data for security purposes is conflicting with these companies use of exactly the same data for commercial purposes. Indeed, this is at the very heart of their business models. For these companies, the creation of this securitised data flow is at odds with commercial priorities to the extent that they feel a need to protest against it. Their protest emphasised their need to maintain market position as trustworthy service providers they needed to appeal to the human rights agenda. The contribution of this book is to identify the different ways in which a situation like this can be examined as an organisational problem. We show how it can have deep and multi-layered impacts on firms and their employees. These impacts stem from organisations having to respond to seemingly irreconcilable regulatory and commercial demands. They reverberate throughout stakeholder networks and detrimentally affect those with the least power. At the level of management practice, such demands can be seen as a regulatory compliance problem, a Corporate Social Responsibility problem, a strategic problem, a problem of market positioning and customer relationship management and finally, because of firms internal politics of production, it is particularly a problem for labour. It is all of these things. We submit, however, that the unique experiential quality of these regimes for firms and their employees stems from the fact they constitute firms as intermediaries in large scale surveillance infrastructures. Firms are so constituted through practices of securitisation. Because consumer data is of such interest for national security, it grows in importance as a source of intelligence about the identities and activities of criminals and terrorists. As Huysmans (2014) argues, security is accomplished by foregrounding the insecurities inherent in any situation and, then, by mobilising resources to address them. Such insecurities stem from the legal responsibilities that come with identifying and handling potentially important information which is also commercially important. Introducing national security into commercial processes introduces new vulnerabilities into commercial operations. To construct something as a security matter does something, both analytically and practically, and it is this: To securitise a practice enacts it as dangerous. 8 See footnote 7. 20
22 Consumer data and the war on terror Our empirical focus is on the Anti-Money Laundering/Counter Terrorism Financing (AML/CTF) and eborders regimes. In the former scheme, banks, building societies, insurance companies and other financial services organisations are expected to look into the backgrounds of their customers for any suspicious activity when they buy a new product, and to monitor on-going transactions for anything out of the ordinary. If they have sufficient suspicion they are to submit a suspicious activity report to the National Crime Agency (NCA) (which used to be called the Serious Organised Crime Agency or SOCA), and are criminalised if they fail to do so. In the latter, airlines and their downstream supply chains are to collect passport data in advance of travel and transfer it to the UK Border Agency for screening against watch-lists, once again under threat of criminalisation. As regulation put in place to feed into national security strategy, both AML/CTF and eborders enact and constitute the activities which pervade the commercial practices of enabling people to travel and enabling people to use money as being shot through with insecurities. These new insecurities result in organisational tensions, competing pressures on resources as well as new anxieties introduced into the firms operation. We find that many of these anxieties arise from the responsibilities which the regulations place upon organisations. Critically, as security practices become part of organisational routines, the ongoing burden of compliance rests with those in customer-facing jobs. We explore how national security processes interact with local workplace politics as they simultaneously intensify employee workloads and fundamentally change the roles they perform. Ultimately we counter recent arguments made by security studies specialists which suggest that the diffusion of security practices de-politicises security. As security becomes diffused it re-emerges in local political circulations, takes on a new political significance and opens up new possibilities for debate and resistance. We shall continue to see a struggle for legitimacy between the insecurities of security and business priorities as a securitised information flow gets forged. Security, surveillance, transdisciplinarity The book is positioned at the interstices of a number of business and social science disciplines organisation studies; marketing; information systems 21
23 CHAPTER ONE and surveillance studies and employs theory and method from all of them. Within this work, we draw on a generic definition of surveillance as any collection and processing of personal data, whether identifiable or not, for the purposes of influencing or managing those whose data have been garnered (Lyon, 2001:2). The argument we build is grounded not only in the theory, politics and practice of mass consumer surveillance and the discrimination, exclusion and social sorting that results, but also in the critical observation that such practices are a fundamental part of modern organising. As bureaucracies began to form in order to manage local populations and to supply goods and services, so did information systems containing records of individual customers and citizens (Beniger, 1986). With the growth of information processing capacity, oversight, management and manipulation of these datasets became possible and modern surveillance was born. So, in our view, surveillance is not a malign plot hatched by evil powers (Surveillance Studies Network, 2006), but a process of information gathering, analysis and application which makes modern living possible. Developing surveillance capacity is hence a normal part of both the governmental and private sector agenda: however, it is in the context of national security that these two surveillant domains begin to join up and fragment in new and powerful ways. For private sector organisations, surveillance emerges as a way of monitoring resource use, productive capacity and managing risk and liability. A key development in the last 20 years has been that of customer relationship management (CRM) where customer transaction data are monitored to identify tastes, preferences and maintain the long term customer relationship. This strategy involves the mining of customer information to anticipate and service customer needs. It is used with varying degrees of sophistication across a variety of industrial sectors. It has proved particularly effective for many large financial service organisations, enabling them to identify lucrative groups of consumers, target products appropriate to those consumers and generate revenue (see Dibb and Meadows, 2004). Data analysis in the national security context often relies on the very same transactional data as CRM, and on similar statistical techniques, to sort through those data and identify suspicious activity. CRM focuses on the attractive customers, whereas national security practices seek to find the risky ones. Indeed the point of customer contact for the organisation is frequently the point of data capture for the national security regimes we investigate. Work 22
ANTI MONEY LAUNDERING/COUNTER TERROR FINANCE REGULATIONS AND THE FINANCIAL SERVICES SECTOR
ANTI MONEY LAUNDERING/COUNTER TERROR FINANCE REGULATIONS AND THE FINANCIAL SERVICES SECTOR A RESEARCH REPORT FOR PARTICIPATING ORGANISATIONS Kirstie Ball, Ana Canhoto*, Elizabeth Daniel, Sally Dibb, Maureen
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationCivil Rights, Security and Consumer Protection in the EU
Internationale Politikanalyse Internationale Politikanalyse International Policy Analysis European Integration Working Group* Civil Rights, Security and Consumer Protection in the EU Civil Liberties: Data
More informationMinister Shatter presents Presidency priorities in the JHA area to European Parliament
Minister Shatter presents Presidency priorities in the JHA area to European Parliament 22 nd January 2013 The Minister for Justice, Equality and Defence, Alan Shatter TD, today presented the Irish Presidency
More informationJust Net Coalition statement on Internet governance
Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a
More informationPurpose of this document
Independent Financial Advisors (IFAs), Mortgage Brokers and Retail Intermediaries: Identifying Risks to your Business and Reporting Suspicious Activity This is a United Kingdom Financial Intelligence Unit
More informationIDENTITY MONITORING: KEEPING A FINGER ON THE PULSE OF CLIENT IDENTITY CHANGES
IDENTITY MONITORING: KEEPING A FINGER ON THE PULSE OF CLIENT IDENTITY CHANGES By Neil Jeans The views and opinions expressed in this paper are those of the authors and do not necessarily reflect the official
More informationETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY
ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY Introduction This document is the final and Board approved version of ETI s strategic directions based on the ETI Board meeting discussion of 12 th March 2015.
More informationThe proposed Fourth Money Laundering Directive
The proposed Fourth Money Laundering Directive What the proposed Directive means and how to keep your business safe USING IDENTITY INTELLIGENTLY Money Laundering Directive What the proposed Directive means
More informationTHE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
More informationlow levels of compliance with the regulations and POCA by negligent HVD operators are enabling criminals to launder the proceeds of crime
6.185 Under the regulations HMRC must maintain a registry of HVDs. However the regulations do not enable HMRC to conduct a fit and proper person test on those who seek to register as an HVD. From 2004
More informationThe Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices
The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices Hans Born, Senior Fellow, DCAF Geneva Brussels, 29 April 2004 Presentation given at the Book
More informationProtecting betting integrity
Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are
More informationRegulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000 Consultation: Equipment Interference and Interception of Communications Codes of Practice 6 February 2015 Ministerial Foreword The abilities to read or listen
More informationIn an age where so many businesses and systems are reliant on computer systems,
Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their
More informationPCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES
PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES Cyber Attacks: How prepared are you? With barely a day passing without a reported breach of corporate information security, the threat to financial
More informationEXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007. 2007 No. 2199
EXPLANATORY MEMORANDUM TO THE DATA RETENTION (EC DIRECTIVE) REGULATIONS 2007 2007 No. 2199 1. This explanatory memorandum has been prepared by the Home Office and is laid before Parliament by Command of
More informationContract Management Part One Making the Business Case for Investment
Contract Management Part One Making the Business Case for Investment Executive Summary This paper is the first in a short series of three which will look at the business case for organisations to invest
More information2011-2014. Deliverable 1. Input on the EU's role in fighting match-fixing. Expert Group "Good Governance. EU Work Plan for Sport
EU Work Plan for Sport 2011-2014 Expert Group "Good Governance Deliverable 1 Input on the EU's role in fighting match-fixing J u n e 2012 2 1. INTRODUCTION The EU Work Plan for Sport identifies integrity
More informationFuture Directions for the Border Sector
Future Directions for the Border Sector Note about this document The Government s three border agencies (the Ministry of Agriculture and Forestry, New Zealand Customs Service and Department of Labour)
More informationCayman Islands Compliance Officer and the Role of the Money Laundering Reporting Officer
Cayman Islands Compliance Officer and the Role of the Money Laundering Reporting Officer Introduction Money laundering is the process by which the direct or indirect benefit of crime is channelled through
More informationTHE SEVEN KEY CHALLENGES OF CONDUCT RISK MANAGEMENT WHITE PAPER
THE SEVEN KEY CHALLENGES OF CONDUCT RISK MANAGEMENT WHITE PAPER THE SEVEN KEY CHALLENGES OF CONDUCT RISK MANAGEMENT CONTENTS 1. MANAGING AND EMBEDDING GOVERNANCE 4 2. DEFINITION OF THE BUSINESS MODEL 5
More informationThe big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology
The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology Evidence from the UK Computing Research Committee Definitive. 1 September 2015 The UK Computing Research
More informationLondon Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets
More informationANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY
ANTI-MONEY LAUNDERING/ COUNTER TERRORISM FINANCING POLICY TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 Preamble... 3 Policy Parameters... 4 KEY TERMS... 4 POLICY OBJECTIVE, RATIONALE AND DELIVERABLES... 6
More informationUK - legal overview by John Hagan and Melanie Ellis
The Gambling Act 2005 ( the 2005 Act ), which came into force on 1 September 2007, regulates all forms of gambling in the UK with the exception of the National Lottery and spread betting. This legislation
More informationBasel Committee on Banking Supervision. Sharing of financial records between jurisdictions in connection with the fight against terrorist financing
Basel Committee on Banking Supervision Sharing of financial records between jurisdictions in connection with the fight against terrorist financing April 2002 Sharing of financial records between jurisdictions
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationCyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
More information1 Data Protection Principles
Today, our personal information is being collected, shared, stored and analysed everywhere. Whether you are browsing the internet, talking to a friend or making an online purchase, personal data collection
More informationTitle: From Participatory Culture to Prosumer Capitalism: Imaginaries of Transparency in the Age of Corporate Surveillance
Title: From Participatory Culture to Prosumer Capitalism: Imaginaries of Transparency in the Age of Corporate Surveillance Bio: Pieter Verdegem is Assistant Professor (Tenure Track) in New media and Information
More informationAnti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach
Anti-money laundering and countering the financing of terrorism the Reserve Bank s supervisory approach Hamish Armstrong In September 2010, a Bulletin article set out the Reserve Bank of New Zealand s
More informationEDRi s. January 2015. European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70
EDRi s Red lines on TTIP January 2015 European Digital Rights Rue Belliard 20, 1040 Brussels www.edri.org @EDRi tel. +32 (0) 2 274 25 70 ABOUT EDRI European Digital Rights is a network of 34 privacy and
More informationBuilding Collective Capacity for Criminal Justice Policy Change Deborah H. Drake and Neena Samota
Paper presented to the British Society of Criminology Conference, Liverpool 10-12 July, 2014 and the European Group for the Study of Deviance and Social Control Annual Conference, Liverpool 3-6 September
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationDEPARTMENT OF LABOUR IMMIGRATION. Enforcing the Immigration Act 2009 Employers and Carriers
DEPARTMENT OF LABOUR IMMIGRATION Enforcing the Immigration Act 2009 Employers and Carriers 1 Table of Contents Introduction...3 Administration of Immigration Laws...3 The Department of Labour s Enforcement
More informationSelling Telematics Motor Insurance Policies. A Good Practice Guide
Selling Telematics Motor Insurance Policies A Good Practice Guide April 2013 1 INTRODUCTION 1.1 The purpose of the guidance This guidance sets out high-level actions that insurers should seek to achieve
More informationData controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
More informationMr President, Ladies and Gentlemen Members of the Court, Mr Advocate. Thank you for inviting the European Data Protection Supervisor today.
Request for an Opinion by the European Parliament, draft EU-Canada PNR agreement (Opinion 1/15) Hearing of 5 April 2016 Pleading notes of the European Data Protection Supervisor (EDPS) Mr President, Ladies
More informationFAQs Organised Crime and Anti-corruption Legislation Bill
FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised
More informationChanges to Consumer Credit Regulation
A Guide for Motor Dealers Introduction Motor Dealers are invariably also credit brokers and are currently required to be licensed by the Office of Fair Trading (OFT) for (at least) their credit broking
More informationHome Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
More informationNordea Bank AB FI Ref. 13-1784 through Chair of Board Service no. 1 Smålandsgatan 17 105 71 STOCKHOLM
18 May 2015 DECISION Nordea Bank AB FI Ref. 13-1784 through Chair of Board Service no. 1 Smålandsgatan 17 105 71 STOCKHOLM Warning and administrative fine Finansinspektionen's decision (to be issued on
More informationDIRECTIVE FOR CONDUCT WITHIN THE NATIONAL PAYMENT SYSTEM IN RESPECT OF THE FINANCIAL ACTION TASK FORCE RECOMMENDATIONS FOR ELECTRCMC FUNDS TRANSFERS
40 No. 38894 GOVERNMENT GAZETTE, 26 JUNE 2015 SOUTH AFRICAN RESERVE BANK SUID-AFRIKAANSE RESERWEBANK No. 538 26 June 2015 South African Reserve Bank DIRECTIVE FOR CONDUCT WITHIN THE NATIONAL PAYMENT SYSTEM
More informationPost-course knowledge check
Australian Government Australian Transaction Reports and Analysis Centre Post-course knowledge check Introduction to AML/CTF e-learning course This knowledge check will provide you with an indication of
More informationRequest under the Freedom of Information Act 2000 (FOIA)
Our Ref: 003668/15 Freedom of Information Section Nottinghamshire Police HQ Sherwood Lodge, Arnold Nottingham NG5 8PP 9 July 2015 Tel: 101 Ext 800 2507 Fax: 0115 967 2896 Request under the Freedom of Information
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationEXECUTIVE SUMMARY. EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium
EXECUTIVE SUMMARY EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium The Multi Stakeholder Forum on Corporate Social Responsibility (CSR) was held in Brussels
More informationNational Occupational Standards. Compliance
National Occupational Standards Compliance NOTES ABOUT NATIONAL OCCUPATIONAL STANDARDS What are National Occupational Standards, and why should you use them? National Occupational Standards (NOS) are statements
More informationChanges coming to the U.K. online gaming market
COVER STORY Changes coming to the U.K. online gaming market Top legal experts in the U.K. preview tax and regulatory changes to Europe s most important market Changes coming to the U.K. online gaming market
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationWho s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
More informationISO 19600: The development
1 Baltzer Science Publishers ISO 19600: The development of a global standard on compliance management By Sylvie Bleker and Dick Hortensius* It has been a traditional complaint of the global compliance
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationTHE UK S ANTI-MONEY LAUNDERING LEGISLATION AND THE DATA PROTECTION ACT 1998 GUIDANCE NOTES FOR THE FINANCIAL SECTOR. April 2002
THE UK S ANTI-MONEY LAUNDERING LEGISLATION AND THE DATA PROTECTION ACT 1998 GUIDANCE NOTES FOR THE FINANCIAL SECTOR April 2002 Introduction 1. This guidance has been prepared by the Government departments
More informationPresidency conclusions on establishing a strategy to combat the manipulation of sport results
COU CIL OF THE EUROPEA U IO EN Presidency conclusions on establishing a strategy to combat the manipulation of sport results 3201st EDUCATIO, YOUTH, CULTURE and SPORT Council meeting Brussels, 26 and 27
More informationDRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions
DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.
More informationIsle of Man Government
Isle of Man Government Commitment to Combating Money Laundering and the Financing of Terrorism & Proliferation Council of Ministers June 2012 Isle of Man Government Commitment to Combating Money Laundering
More informationA guide to reducing the cost of AML compliance with electronic identity verification
A guide to reducing the cost of AML compliance with electronic identity verification Legal firms often struggle with the cost of compliance associated with Anti-Money Laundering Regulations. Electronic
More informationAn introduction to European employment law for Japanese companies
Acquisitions issues to expect Employing staff in Europe An introduction to European employment law for Japanese companies For Japanese companies encountering the European employment law system for the
More informationBuilding Equality, Diversity and Inclusion into the NHS Board Selection Process for Non Executives and Independent Directors March 2012 Edition
Building Equality, Diversity and Inclusion into the NHS Board Selection Process for Non Executives and Independent Directors March 2012 Edition The NHS Leadership Academy s purpose is to develop outstanding
More informationLABORATORY OUTSOURCING
June 2009 LABORATORY OUTSOURCING Intertek s EVP of Analytical Services, Dr. Andrew Swift, discusses laboratory outsourcing and explains how dedicated analytical service providers are stepping up to support
More informationEU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004
COUNCIL OF THE EUROPEAN UNION Dromoland Castle, 26 June 2004 10760/04 (Presse 205) EU-U.S. DECLARATION ON COMBATING TERRORISM DROMOLAND CASTLE, 26 JUNE 2004 Since the attacks of 11 September 2001, the
More informationPolicy Submission. Submission on the Criminal Justice (Money Laundering) Bill 2008
Policy Submission Submission on the Criminal Justice (Money Laundering) Bill 2008 April 2008 Submission on Criminal Justice (Money Laundering) Bill 2008 Introduction April, 2008 The Combat Poverty Agency
More informationFinancial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for
Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies
More informationCo-operatives for Europe: Moving forward together
Co-operatives for Europe: Moving forward together 3 In Finland, 75% of the population are members of a co-operative enterprise. In Belgium, when you enter a pharmacy, there is a 1 in 5 chance that you
More informationGAMBLING LICENSING ABIGAIL HUDSON NOVEMBER 2015
GAMBLING LICENSING ABIGAIL HUDSON NOVEMBER 2015 Gambling Act 2005 The objectives of the Gambling Commission and Licensing Authorities are defined as: Preventing gambling from being a source of crime or
More informationA BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper
A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively
More informationThe Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation. Initial Discussion Paper
The Role and Function of a Data Protection Officer in the European Commission s Proposed General Data Protection Regulation 1. Introduction Initial Discussion Paper The data protection officer ( DPO )
More informationCUSTOMER RELATIONSHIP MANAGEMENT AND DATA WAREHOUSING
03-03-10 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES CUSTOMER RELATIONSHIP MANAGEMENT AND DATA WAREHOUSING Duane E. Sharp INSIDE The CRM Solution; Customer Feedback; Defining the Customer;
More informationSPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS
)LQDQFLDO$FWLRQ7DVN)RUFH RQ0RQH\/DXQGHULQJ *URXSHGDFWLRQILQDQFLqUH VXUOHEODQFKLPHQWGHFDSLWDX[ '(7(&7,1*$1'35(9(17,1*7+(&5266%25'(5 75$163257$7,212)&$6+%
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationGROUP POLICY TO COMBAT MONEY LAUNDERING AND TERRORIST FINANCING. Anti-Money Laundering Policy
PAG. 1 DI 37 GROUP POLICY TO COMBAT MONEY LAUNDERING AND TERRORIST FINANCING Anti-Money Laundering Policy MACROPROCESS PROCESS TITLE DATE OF UPDATE PROTOCOL NO. 6 INTERNAL AND DEVELOPMENT PROCESSES 6.02
More informationBuilding Public Trust: Ethics Measures in OECD Countries
Building Public Trust: Ethics Measures in OECD Countries Annex 1998 Recommendation of the OECD Council on Improving Ethical Conduct in the Public Service, 36 Including Principles for Managing Ethics in
More informationCOMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,
COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD
More informationIntroduction to Social Compliance & Its Business Benefits
Proposal for Conducting Seminar on Introduction to Social Compliance & Its Business Benefits Submitted to: Environment Agency, Abu Dhabi Table of Contents Summary..02 Seminar Objectives 02 Content Outline..02
More informationThe Department for Business, Innovation & Skills (BIS) & The Home Office. Tackling exploitation in the labour market
The Chartered Institute of Building submission to The Department for Business, Innovation & Skills (BIS) & The Home Office on the consultation on Tackling exploitation in the labour market 3 December 2015
More informationI. CONTEXT II. POLITICAL PRIORITIES IDENTIFIED
SHAPING THE FUTURE OF EQUALITY POLICIES IN THE EU JOINT HIGH LEVEL EVENT ON NON-DISCRIMINATION AND EQUALITY, ROME, 6-7 NOVEMBER 2014 SUMMARY AND MAIN CONCLUSIONS I. CONTEXT The Italian Presidency of the
More informationCouncil of the European Union Brussels, 28 July 2015 (OR. en)
Conseil UE Council of the European Union Brussels, 28 July 2015 (OR. en) PUBLIC 11243/15 LIMITE DRS 50 CODEC 1084 NOTE From: To: Subject: General Secretariat of the Council Delegations Proposal for a DIRECTIVE
More informationChairman Frank, Members of the Committee, the Isle of Man Government welcomes the opportunity to submit written testimony to your Committee.
House Financial Services Committee Hearing Can Internet Gambling be Effectively Regulated to Protect Consumers and the Payments Systems June 8, 2007 Statement for the Hearing Record Submitted by Mary Williams,
More informationAUSTRAC. supervision strategy 2012 14
AUSTRAC supervision strategy 2012 14 Commonwealth of Australia 2012 This work is copyright. You may download, display, print and reproduce this material in unaltered form only (retaining this notice) for
More informationCapgemini Financial Services. 29 July 2010
Regulatory Compliance: The critical importance of data quality Capgemini Financial Services ACORD IT Club Presentation 29 July 2010 Confidentiality Agreement Notice to the Recipient of this Document The
More informationWhite Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA
White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting
More informationWhether you are a practising
Introduction By the end of the programme, you will have a specialised knowledge of international business law that reflects the changing commercial, social, political and technical realities of the global
More informationPolicy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.
International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction
More informationThe proposed legislation would end the all too frequent use of loopholes in State incorporation laws to hide money.
Testimony of Jack A. Blum, Esq. before The United States Senate Committee on Homeland Security and Governmental Affairs on S.569, the Incorporation Transparency and Law Enforcement Assistance Act November
More informationOnline Research and Investigation
Online Research and Investigation This document is intended to provide guidance to police officers or staff engaged in research and investigation across the internet. This guidance is not a source of law
More informationBPI response to the Draft Ofcom Annual Plan 2013-14
BPI response to the Draft Ofcom Annual Plan 2013-14 Introduction 1. BPI welcomes the opportunity to comment on the planned work of Ofcom in the year 2013-14. BPI will contain its comments to those aspects
More informationPRESS KIT COUNTERING TERRORIST FINANCING
PRESS KIT COUNTERING TERRORIST FINANCING Wednesday, 18 March 2015 Money is always and everywhere the sinews of war: terrorists need vital funds to buy weapons, vehicles and arsenals. International action
More informationCFIUS and Network Security Agreements 1
CFIUS and Network Security Agreements 1 Mark E. Plotkin 2 David M. Marchick 3 David N. Fagan 4 This memorandum provides an overview of the principal U.S. government national security considerations and
More informationModule 4. Risk assessment for your AML/CTF program
Module 4 Risk assessment for your AML/CTF program AML/CTF Programs Risk assessment for your AML/CTF program Page 1 of 27 Module 4 Risk assessment for your AML/CTF program Risk assessment for your AML/CTF
More informationFinancial services regulation in Jersey
www.bedellgroup.com Jersey Guernsey London Dublin Mauritius BVI Singapore Financial services regulation in Jersey Bedell Cristin Jersey briefing briefing Jersey's reputation as a leading international
More informationResponse to the European Commission consultation on. European Data Protection Legal Framework
Response to the European Commission consultation on European Data Protection Legal Framework A submission by Acxiom (ID number 02737212854-67) Correspondence Address: Martin-Behaim-Straße 12, 63263 Neu-Isenburg,
More informationHow To Get A Security Degree In Australia
Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.
More informationMarket demutualisation and privatisation: The Australian experience
Market demutualisation and privatisation: The Australian experience An address by Jeffrey Lucy AM FCA Chairman Australian Securities and Investments Commission (ASIC) To International Organisation of Securities
More informationLiberating the NHS regulating healthcare providers consultation on proposals
Liberating the NHS regulating healthcare providers consultation on proposals This document is the response from Association of British Healthcare Industries (ABHI) to the consultation above. ABHI has responded
More informationEncryption and Digital Signatures
GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/
More informationPrivacy & Data Security: The Future of the US-EU Safe Harbor
Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT
More informationMPS GROUP GLOBAL ANTI-MONEY LAUNDERING POLICY
Siena, march 2012 Pag. 1 di 5 MPS GROUP 1 - A p p l i c a t i o n This Global Anti-Money Laundering Policy (Policy) applies to all Banca Monte dei Paschi di Siena subsidiaries and branches (collectively
More information